Please turn on your JavaScript for this page to function normally.
open lock
Weak DevOps cryptographic policies increase financial services cyber risk

Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is …

vault
First post-quantum cryptography on a contactless security chip

Due to their computing power, quantum computers have the disruptive potential to break various currently used encryption algorithms. Infineon Technologies has successfully …

locks
Breaking TLS: Good or bad for security?

As the use of TLS by malware and phishing increases, some security practitioners are seeking solutions to break TLS so they can monitor all traffic in and out of their …

https
Number of HTTPS phishing sites triples

When, in January 2017, Mozilla and Google made Firefox and Chrome flag HTTP login pages as insecure, the intent was to make phishing pages easier to recognize, as well as push …

17 million Zomato accounts for sale following breach

Popular restaurant search and discovery service Zomato has suffered a breach, and the attackers made off with 17 million user records. What data was compromised? These records …

quantum
Advantages of quantum processing shown in head-to-head race

A prototype quantum processor repeatedly beat a traditional, classical processor in a race to solve a puzzle, figuring out a secret combination up to 100 times faster by using …

vault
Finally, enterprise-wide encryption strategies increase!

New research by the Ponemon Institute captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to …

numbers
23% of security pros are blind to encrypted traffic threats

According to a Venafi survey conducted at RSA Conference 2017, 23 percent of respondents have no idea how much of their encrypted traffic is decrypted and inspected. …

Trump
Use of digital privacy tools increased in wake of Trump’s ascent to power

Since Edward Snowden’s revelations about the extent of global online and communications surveillance, the issue of privacy of online browsing habits and digital …

quantum
WWW inventor Tim Berners-Lee opposes encryption backdoors

As the de-facto inventor of the world wide web, Sir Tim Berners-Lee’s opinions on things like online privacy and encryption backdoors should carry a lot more weight than …

USA flag
US Congress votes for ISPs to be able to sell customers’ info and browsing history

After the US Senate, the US House of Representatives has voted on whether the privacy rules imposed late last year by the Federal Communications Commission (FCC) on Internet …

iPhone, iPad, iOS, Apple
With iOS 10.3, iDevices get new Apple File System with native encryption support

On Monday, Apple released updates for its various products. As usual, they fix flaws and add capabilities, but the iOS update (v10.3) is more noteworthy than usual, as it will …

Don't miss

Cybersecurity news